Analysis
-
max time kernel
291s -
max time network
178s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
29/03/2023, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe
Resource
win7-20230220-en
General
-
Target
83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe
-
Size
3.4MB
-
MD5
ee1a1964f97f469e9ede06c68f5b2111
-
SHA1
cc0bea12750522e977d5fce70fb0087f2d10cacc
-
SHA256
83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74
-
SHA512
eecd8982b5ad80b0824ef07185d246aca16528d1c846a04fb2ce46122d85b31330b20630dd6e4a4c7d5f3519e3b21e9cfa90e18a335646734abcf396f9c3bc18
-
SSDEEP
98304:JUwOIEK84WQsykAeYXkAeYUaMImg8C0Qu9JuR21C/yIq/dhl/O4i/TksjdFwvhzh:JUwOIEK84WQsykAeYXkAeYUaMImg8C0j
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ OracleMicrosoft-type7.4.8.9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ OracleMicrosoft-type7.4.8.9.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OracleMicrosoft-type7.4.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OracleMicrosoft-type7.4.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OracleMicrosoft-type7.4.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OracleMicrosoft-type7.4.8.9.exe -
Executes dropped EXE 2 IoCs
pid Process 2664 OracleMicrosoft-type7.4.8.9.exe 3892 OracleMicrosoft-type7.4.8.9.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1700 icacls.exe 2104 icacls.exe 4052 icacls.exe -
resource yara_rule behavioral2/files/0x000600000001af0b-148.dat upx behavioral2/files/0x000600000001af0b-150.dat upx behavioral2/memory/2664-151-0x00007FF747F50000-0x00007FF74846F000-memory.dmp upx behavioral2/memory/2664-155-0x00007FF747F50000-0x00007FF74846F000-memory.dmp upx behavioral2/memory/2664-156-0x00007FF747F50000-0x00007FF74846F000-memory.dmp upx behavioral2/files/0x000600000001af0b-157.dat upx behavioral2/memory/3892-158-0x00007FF747F50000-0x00007FF74846F000-memory.dmp upx behavioral2/memory/3892-159-0x00007FF747F50000-0x00007FF74846F000-memory.dmp upx behavioral2/memory/3892-160-0x00007FF747F50000-0x00007FF74846F000-memory.dmp upx behavioral2/memory/3892-161-0x00007FF747F50000-0x00007FF74846F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OracleMicrosoft-type7.4.8.9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OracleMicrosoft-type7.4.8.9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4404 set thread context of 1316 4404 83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe 67 -
Program crash 1 IoCs
pid pid_target Process procid_target 1884 4404 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4756 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4404 wrote to memory of 1316 4404 83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe 67 PID 4404 wrote to memory of 1316 4404 83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe 67 PID 4404 wrote to memory of 1316 4404 83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe 67 PID 4404 wrote to memory of 1316 4404 83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe 67 PID 4404 wrote to memory of 1316 4404 83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe 67 PID 1316 wrote to memory of 1700 1316 AppLaunch.exe 70 PID 1316 wrote to memory of 1700 1316 AppLaunch.exe 70 PID 1316 wrote to memory of 1700 1316 AppLaunch.exe 70 PID 1316 wrote to memory of 4052 1316 AppLaunch.exe 73 PID 1316 wrote to memory of 4052 1316 AppLaunch.exe 73 PID 1316 wrote to memory of 4052 1316 AppLaunch.exe 73 PID 1316 wrote to memory of 2104 1316 AppLaunch.exe 72 PID 1316 wrote to memory of 2104 1316 AppLaunch.exe 72 PID 1316 wrote to memory of 2104 1316 AppLaunch.exe 72 PID 1316 wrote to memory of 4756 1316 AppLaunch.exe 76 PID 1316 wrote to memory of 4756 1316 AppLaunch.exe 76 PID 1316 wrote to memory of 4756 1316 AppLaunch.exe 76 PID 1316 wrote to memory of 2664 1316 AppLaunch.exe 78 PID 1316 wrote to memory of 2664 1316 AppLaunch.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe"C:\Users\Admin\AppData\Local\Temp\83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\OracleMicrosoft-type7.4.8.9" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1700
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\OracleMicrosoft-type7.4.8.9" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2104
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\OracleMicrosoft-type7.4.8.9" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4052
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "OracleMicrosoft-type7.4.8.9\OracleMicrosoft-type7.4.8.9" /TR "C:\ProgramData\OracleMicrosoft-type7.4.8.9\OracleMicrosoft-type7.4.8.9.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4756
-
-
C:\ProgramData\OracleMicrosoft-type7.4.8.9\OracleMicrosoft-type7.4.8.9.exe"C:\ProgramData\OracleMicrosoft-type7.4.8.9\OracleMicrosoft-type7.4.8.9.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2802⤵
- Program crash
PID:1884
-
-
C:\ProgramData\OracleMicrosoft-type7.4.8.9\OracleMicrosoft-type7.4.8.9.exeC:\ProgramData\OracleMicrosoft-type7.4.8.9\OracleMicrosoft-type7.4.8.9.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847.0MB
MD55a29799884d2b2fbc15748fd1ac191d2
SHA18a5d2c99056d1e324e882ac77fa388c8676a37fa
SHA256978f408448a210a5a8671916a82227e2f72109080088bb61c2aacc4686508fc9
SHA512a73bb119d9ea3c027c178c933381ef60cd83711655b54b0eb1e473457ae3ca0c5ccf1a4c0d44bd704c6c2d52464f5a701d1d64b69b25770e28a0590543c306b6
-
Filesize
847.0MB
MD55a29799884d2b2fbc15748fd1ac191d2
SHA18a5d2c99056d1e324e882ac77fa388c8676a37fa
SHA256978f408448a210a5a8671916a82227e2f72109080088bb61c2aacc4686508fc9
SHA512a73bb119d9ea3c027c178c933381ef60cd83711655b54b0eb1e473457ae3ca0c5ccf1a4c0d44bd704c6c2d52464f5a701d1d64b69b25770e28a0590543c306b6
-
Filesize
847.0MB
MD55a29799884d2b2fbc15748fd1ac191d2
SHA18a5d2c99056d1e324e882ac77fa388c8676a37fa
SHA256978f408448a210a5a8671916a82227e2f72109080088bb61c2aacc4686508fc9
SHA512a73bb119d9ea3c027c178c933381ef60cd83711655b54b0eb1e473457ae3ca0c5ccf1a4c0d44bd704c6c2d52464f5a701d1d64b69b25770e28a0590543c306b6